Appendix
I
— Examples of threat scenarios with a
potential harmful impact on safety
ED Decision 2023/009/R
The following is a non-exhaustive list of examples of information security threat scenarios with a potential harmful impact on safety that may be considered by authorities and organisations.
Example 1: Aircraft to ATC digital communications
—
Threat vector
assets/domain
— ATC voice and ground automation systems
— ground communications providers
— air-ground/ground-air RF communications service providers
— aircraft and the assets used for voice and datalink communications
—
Non-exhaustive summary
of potential threats
— threat (availability): exceeding system performance, saturation of communication channel
— threat (integrity): man-in-the-middle or injection attacks
— threat (confidentiality): passive listening to communication, spying on hardware device
—
Summary of threats
scenarios and their potential harmful impacts on safety
— Disruption of services prevents ATC communication with a single or multiple aircraft and/or ATC ground system.
— Manipulation of data through a man-in-the-middle attack would present false information to the pilot and/or ATC system with the potential of creating a safety hazard or injection of data to the aircraft or ground systems to disrupt the service and capability.
— There are no specific regulatory requirements for encryption of data or voice for datalink communications; however, for confidentiality purposes, the assets used to provide and deliver the services should be controlled and limited to only those resources that require access to ensure that the services cannot be disrupted and manipulated in any way.
Example 2: Tampered air traffic data
—
Threat vector
assets/domain
— Internet service provider (ISP)
— ATM services network(s)
— surveillance data
— ATC systems
—
Non-exhaustive summary
of potential threats
— ISP compromise (confidentiality): An attacker gains unauthorised access to the systems or infrastructure of the ISP providing network services to ATM system.
— data tampering (integrity): Once the ISP is compromised, an attacker could manipulate data in transit. This could involve injecting false data or removing/modifying legitimate data.
— denial of service (availability): an attacker could also potentially disrupt the communication of data entirely, resulting in a denial of service (DoS) to the ATM system.
— malware injection (integrity/availability): An attacker could potentially use the compromised ISP as a launching pad to inject malware into the systems, causing further disruptions or enabling additional attacks.
—
Summary of threats
scenarios and their potential harmful impacts on safety
— ISP compromise: interception and/or manipulation of sensitive data, impacting the safe management of air traffic.
— data tampering: incorrect situational awareness, potentially resulting in reduced separation between aircrafts, and incorrect air traffic control decisions.
— denial of service: reduction of the ATC’s ability to ensure separation leading to the activation of contingency procedures, including capacity reduction, with the eventual possibility of large areas of airspace being closed.
Example 3: Aircraft operators’, CAMOs’ and aircraft maintenance organisations’ software supply chain and ground infrastructure, including equipment used to support aircraft management, operations and maintenance
—
Threat vector
assets/domain
— aircraft operators’, CAMOs’ and maintenance organisations’ supply chain
— aircraft operator or maintenance internal ground infrastructure used to manage aircraft and operations (hardware/software) and other information technology assets
— information technology assets used to update systems on an aircraft (software and hardware) used for maintenance activities
—
Non-exhaustive summary
of potential threats
— threat (availability): hardware/software/system disruption
— threat (integrity): compromised hardware/software/system
— threat (confidentiality): compromised hardware/software/system
—
Summary of threats
scenarios and their potential harmful impacts on safety
— Disruption to the dissemination of meteorological information while the aircraft is airborne, may reduce the ability of the flight crew to avoid potentially hazardous meteorological conditions (e.g. severe storms/fog at night).
— Manipulation of navigation data/database will have the effect that flight plans and navigation displays cannot be trusted.
— Lack of control and access to information such as fleet maintenance programme or flight crew planning affects the ability of organisations to maintain safe operations.
Application of bow-tie analysis to this example
Two coordinated bow-tie analyses of different risk dimensions are combined, as the ultimate interest lies only in the aviation safety consequence.
Information security bow-tie analysis element |
Aviation safety bow-tie analysis element |
Information security threats 1) hardware/software vulnerability exploitation: disturbed system function 2) hardware/software vulnerability exploitation: system integrity compromised 3) hardware/software vulnerability exploitation: confidentiality of information processed by system(s) compromised |
|
Information security preventive
barriers |
|
Information security hazards & top
events 1) disturbed system functionality (hazard) → disrupted/unreliable system functionality 2) system integrity compromised (hazard) → system function unpredictable 3) information disclosable (hazard) → undetectable information exfiltration |
Safety threats 1) disrupted/unreliable system functionality 2) system function unpredictable 3) undetectable information exfiltration |
Information security mitigating
barriers |
Safety preventive barriers 1) Use of access controls for system administration 2) etc. |
Information security consequences 1) loss of system function (= production system down) 2) loss of system function integrity (= some system function wrong/inoperative) 3) loss of confidentiality of information (= some information can leak) |
Safety hazards & top events: 1) loss of system function (hazard) →in operational maintenance system 2) loss of system function integrity (hazard) → systems operate with wrong information 3) loss of information confidentiality (hazard) → confidential maintenance and aircraft internals information leaks |
|
Safety mitigating barriers 1) use of back-up procedures to prevent faulty maintenance actions 2) use of procedures to secure aircraft software integrity |
|
Safety consequences 1) faulty maintenance actions 2) incorrectly completed maintenance actions 3) exfiltration of information allows for identification of vulnerabilities 4) disruption of aircraft systems, unpredictable system function, loss of major aircraft systems (such as engine control) |
Example 4: Design and production organisations’ software, supply chain, design and manufacturing ground infrastructure
—
Threat vector
assets/domain
— design and production organisations’ supply chain for parts, hardware and software
— design and production organisations’ ground internal infrastructure used to manage software/hardware used in the manufacturing and development of products that will be used by aircraft manufacturers, operators or ATM/ANS ground automation systems (hardware/software) information technology assets
— design and production organisations’ information technology assets used by their customers to update systems on an aircraft (software/hardware) used for maintenance operations or ATM/ANS ground automation systems
—
Non-exhaustive summary
of potential threats
— threat (integrity): systems used to store, transmit and exchange information are compromised through man-in-the middle attacks
— threat (confidentiality): systems used to store, transmit and exchange information are accessed by insider or external threats
—
Summary of threats
scenarios and their potential harmful impacts on safety
— Systems used to store, transmit and exchange information can no longer be considered trusted. If they are not maintained at a level to ensure that all information exchange, data and software can be considered trusted, both ground and aircraft operations are disrupted.
— Uncontrolled access to systems used to store, transmit and exchange information (including information that is received and exchanged with the supply chain) can provide technical details that could be used to craft more sophisticated attacks targeting safety-critical systems.
Example 5: Training system
—
Threat vector
assets/domain
— internal infrastructure used in of all software and hardware that will be used in the design, manufacturing or production of products (hardware or software) that will be used in aircraft or ATM/ANS ground systems
— management of internal operating domains and system of all software and hardware that will be used in the design, manufacturing or production of products (hardware or software) that will be used in aircraft or ATM/ANS ground systems
—
Non-exhaustive summary
of potential threats
— threat (integrity): training systems or training devices are compromised through man-in-the middle attacks
— threat (confidentiality): functional models, information and data that are embedded in training systems or training devices are accessed by insider or external threats
—
Summary of threats
scenarios and their potential harmful impacts on safety
— The training model or the failure modes and associated emergency conditions differ from the real aviation system behaviour and therefore induce inappropriate responses. If the training systems cannot be trusted, this will affect the ability of organisations to maintain sufficiently qualified staff for their operations (pilots, maintenance or ATM/ANS ground personnel who have been exposed to improper training should be re-qualified).
— Lack of control and access to training systems affects the ability of organisations to maintain a training system that is known to be in a trusted state. In addition, uncontrolled access to training systems that embed functional models, information and data can provide technical details that could be used to craft more sophisticated attacks on the training system itself or on the real-world safety-critical system.
Example 6: Airport’s fuel delivery system and associated infrastructure
—
Threat vector
assets/domain
— ground fuel storage and distribution infrastructure
— digital systems used to control fuel pumping and metering
— supply chain for fuel delivery, including third-party fuel suppliers
— airport information technology assets used for fuel inventory management and scheduling deliveries
—
Non-exhaustive summary
of potential threats
— threat (availability): disruption of fuel supply or delivery systems
— threat (integrity): tampering with fuel control systems or measurement devices
— threat (confidentiality): unauthorised access to fuel supply and delivery data
—
Summary of threats
scenarios and their potential harmful impacts on safety
— Disruption to fuel delivery can lead to flight delays or cancellations, causing operational disruptions and potential safety issues if fuel reserves become critically low.
— Tampering with fuel control systems or measurement devices could lead to incorrect fuel loads being delivered to aircraft, impacting aircraft weight and balance calculations, and potentially causing fuel exhaustion incidents.
— Unauthorised access to fuel supply data could allow threat actors to manipulate fuel scheduling or inventory data, potentially causing disruptions to airport operations and fuel availability for aircraft.
Example 7: National competent authority’s NOTAM system and associated infrastructure
—
Threat vector
assets/domain
— National NOTAM system infrastructure and digital interface
— Supply chain for NOTAM system maintenance and updates
— National competent authority’s IT assets used for NOTAM creation, distribution, and storage
—
Non-exhaustive summary
of potential threats
— threat (availability): disruption of the NOTAM system or its access
— threat (integrity): tampering with NOTAM data or unauthorised NOTAM creation
— threat (confidentiality): unauthorised access to NOTAM data
—
Summary of threats
scenarios and their potential harmful impacts on safety
— Disruption to the NOTAM system could prevent the dissemination of critical aeronautical information to pilots and air traffic controllers, potentially leading to safety issues.
— Tampering with NOTAM data or unauthorised creation of NOTAMs could lead to incorrect information being disseminated, potentially resulting in pilots making decisions based on false or misleading data.
— Unauthorised access to NOTAM data could lead to information leakage, potentially revealing sensitive operational information.
Example 8: Aviation authority’s airworthiness directive (AD) system and associated infrastructure
—
Threat vector
assets/domain
— EASA AD system infrastructure and digital interface
— supply chain for AD system maintenance and updates
— EASA IT assets used for AD creation, distribution, and storage
—
Non-exhaustive summary
of potential threats
— threat (availability): Disruption of the AD system or its access
— threat (integrity): tampering with AD data or unauthorised AD creation
— threat (confidentiality): unauthorised access to AD data
—
Summary of threats and
their potential harmful impacts on safety
— Disruption to the AD system could prevent the dissemination of critical airworthiness information to aircraft operators and maintenance organisations, potentially leading to safety issues.
— Tampering with AD data or unauthorised creation of ADs could lead to incorrect information being disseminated, potentially resulting in aircraft operators and maintenance organisations making decisions based on false or misleading data.
— Unauthorised access to AD data could lead to information leakage, potentially revealing sensitive operational information.
EASA highlights information security threats impacting aviation safety, including compromised ATC communications, tampered air traffic data, and supply chain vulnerabilities. Risks involve disrupted services, data manipulation, and unauthorized access, potentially leading to incorrect decisions, reduced separation, and compromised aircraft maintenance. Securing systems and data is crucial.
* Summary by Aviation.Bot - Always consult the original document for the most accurate information.